belane / linux-soft-exploit-suggesterLinks
Search Exploitable Software on Linux
☆232Updated 2 years ago
Alternatives and similar repositories for linux-soft-exploit-suggester
Users that are interested in linux-soft-exploit-suggester are comparing it to the libraries listed below
Sorting:
- Pip install exploit package☆157Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆442Updated last year
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆205Updated last year
- ☆208Updated 4 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆267Updated 7 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- A code demonstrating CVE-2018-0886☆268Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 6 months ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆275Updated 3 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆350Updated 4 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆223Updated last year
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆393Updated 8 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆278Updated 7 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆297Updated 2 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆147Updated 6 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆370Updated 5 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago